Comment by kaoD
3 years ago
How is this not vulnerable to side-channel attacks like disk-access patterns?
Could I, as a malicious server, request myself a target article and correlate that with legitimate user requests?
3 years ago
How is this not vulnerable to side-channel attacks like disk-access patterns?
Could I, as a malicious server, request myself a target article and correlate that with legitimate user requests?
> With a proper implementation of PIR, the server still needs to scan through the entire encrypted dataset (this is unavoidable, otherwise its I/O patterns would leak information)
https://news.ycombinator.com/item?id=31669370 (not original poster)